public inbox for stable@vger.kernel.org
 help / color / mirror / Atom feed
From: Sasha Levin <sashal@kernel.org>
To: patches@lists.linux.dev, stable@vger.kernel.org
Cc: Akif Sait <akif.sait111@gmail.com>,
	Namjae Jeon <linkinjeon@kernel.org>,
	Steve French <stfrench@microsoft.com>,
	Sasha Levin <sashal@kernel.org>,
	sfrench@samba.org, linux-cifs@vger.kernel.org,
	linux-kernel@vger.kernel.org
Subject: [PATCH AUTOSEL 7.0-5.15] ksmbd: fix O(N^2) DoS in smb2_lock via unbounded LockCount
Date: Tue, 28 Apr 2026 06:40:49 -0400	[thread overview]
Message-ID: <20260428104133.2858589-38-sashal@kernel.org> (raw)
In-Reply-To: <20260428104133.2858589-1-sashal@kernel.org>

From: Akif Sait <akif.sait111@gmail.com>

[ Upstream commit bd0a1ca52b6da64b1a163f103b28b488b20497fe ]

smb2_lock() performs O(N^2) conflict detection with no cap on LockCount.
Cap lock_count at 64 to prevent CPU exhaustion from a single request.

Signed-off-by: Akif Sait <akif.sait111@gmail.com>
Acked-by: Namjae Jeon <linkinjeon@kernel.org>
Signed-off-by: Steve French <stfrench@microsoft.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---

LLM Generated explanations, may be completely bogus:

Based on my analysis, here is my complete walkthrough:

## PHASE 1: COMMIT MESSAGE FORENSICS

**Step 1.1: Subject line parse**
Record: `[ksmbd:] [fix]` O(N^2) DoS in smb2_lock via unbounded LockCount
- claims to fix a denial-of-service vulnerability.

**Step 1.2: Parse tags**
Record:
- Signed-off-by: Akif Sait <akif.sait111@gmail.com> (author)
- Acked-by: Namjae Jeon <linkinjeon@kernel.org> (**ksmbd maintainer**)
- Signed-off-by: Steve French <stfrench@microsoft.com> (**maintainer who
  pulled it via samba tree**)
- No Fixes: tag (expected for manual review), no Cc: stable (expected)

**Step 1.3: Commit body analysis**
Record: Describes O(N^2) conflict detection with uncapped LockCount.
Attack: authenticated client sends LockCount=65535 -> ~2.1 billion
iterations pinning CPU. A few concurrent requests hang the host.
Justifies cap at 64 per MS-SMB2 spec's Open.LockSequenceArray size.

**Step 1.4: Hidden bug fix detection**
Record: Explicitly labeled "fix" and "DoS" - not hidden; clearly a
security fix.

## PHASE 2: DIFF ANALYSIS

**Step 2.1: Inventory**
Record: 1 file (`fs/smb/server/smb2pdu.c`), ~7 lines added (1 functional
line + 5-line comment + structural whitespace), 1 line removed. Single
surgical fix in `smb2_lock()`.

**Step 2.2: Code flow change**
Record: Before: `if (!lock_count)` rejected only zero. After: `if
(!lock_count || lock_count > 64)` rejects zero AND values >64 with
`-EINVAL` before any work is done.

**Step 2.3: Bug mechanism**
Record: DoS / resource-exhaustion / algorithmic complexity attack. `for
(i = 0; i < lock_count; i++)` with nested `list_for_each_entry(cmp_lock,
&lock_list, llist)` = O(N²). LockCount is u16 (max 65535), giving
~2.1×10⁹ inner-loop iterations plus N smb_flock_init allocations per
request. Fix: bound input parameter.

**Step 2.4: Fix quality**
Record: Obviously correct, minimal, cannot introduce regression for
legitimate workloads (MS-SMB2 spec ceiling is 64), no lock/memory/API
changes.

## PHASE 3: GIT HISTORY INVESTIGATION

**Step 3.1: Blame**
Record: The vulnerable `if (!lock_count)` pattern has existed since
ksmbd was first merged into the kernel in v5.15 (commit that added
`fs/cifsd/smb2pdu.c` then moved to `fs/ksmbd/`, then to `fs/smb/server/`
in v6.3). Confirmed identical pattern in v5.15, v6.1, v6.6, v6.12, v7.0.

**Step 3.2: Fixes: tag follow**
Record: No Fixes: tag provided. Bug is original to ksmbd (v5.15).

**Step 3.3: File history**
Record: Prior related fixes to smb2_lock: `309b44ed68449` (memory
leaks/NULL deref), `e26e2d2e15daf` (bug on trap), `84d2d1641b71d` (UAF),
`8f1752723019d` (memory leak), `75ac9a3dd65f7` (race). Our fix is
independent and standalone.

**Step 3.4: Author**
Record: Akif Sait is a contributor (not maintainer); patch was Acked-by
ksmbd maintainer Namjae Jeon and signed off by CIFS/samba maintainer
Steve French.

**Step 3.5: Dependencies**
Record: None. The fix applies to unchanged `le16_to_cpu(req->LockCount)`
code that exists identically across all stable trees.

## PHASE 4: MAILING LIST RESEARCH

**Step 4.1: Find discussion**
Record: Original submission https://yhbt.net/lore/linux-
cifs/?q=ksmbd+unbounded+LockCount - posted 2026-04-18 15:45 UTC by Akif
Sait. Cover note explicitly states "a single authenticated request with
LockCount=65535 results in roughly 2.1 billion iterations inside a ksmbd
worker thread, pinning the CPU completely. A few concurrent requests
hang the host entirely." Applied by Namjae Jeon to #ksmbd-for-next-next
on 2026-04-20.

**Step 4.2: Reviewers**
Record: To: Namjae Jeon (maintainer), Steve French (CIFS maintainer).
Cc: senozhatsky, tom, linux-cifs - correct mailing lists and
maintainers.

**Step 4.3: Bug report**
Record: No public bug report; the submitter found it via code
inspection, explaining the trigger and providing a reproducer offer.

**Step 4.4: Related patches**
Record: Not part of a series; standalone patch.

**Step 4.5: Stable list**
Record: Included in Steve French's "GIT PULL ksmbd server fixes"
(2026-04-23), explicitly described as "cap maximum lock count to avoid
potential denial of service."

## PHASE 5: CODE SEMANTIC ANALYSIS

**Step 5.1: Key functions**
Record: `smb2_lock()` in fs/smb/server/smb2pdu.c.

**Step 5.2: Callers**
Record: `smb2_lock()` is the SMB2_LOCK_HE handler in the command
dispatch table (`fs/smb/server/smb2ops.c:191`). Reachable from any SMB2
LOCK request from any authenticated client with a valid file handle.

**Step 5.3: Callees**
Record: `smb_flock_init()` (memory alloc), `smb2_set_flock_flags()`,
`smb2_lock_init()` (memory alloc), `list_for_each_entry()` (the O(N²)
loop).

**Step 5.4: Reachability**
Record: SMB2 LOCK handlers are reachable by any authenticated SMB client
after they open a file. This is a network-reachable CPU DoS.

**Step 5.5: Similar patterns**
Record: Smb2misc.c already validates `lock_count * sizeof(struct
smb2_lock_element) <= MAX_STREAM_PROT_LEN (16MB)`, but that still allows
65535 (u16 max) locks, so the size check does not mitigate the O(N²) CPU
attack.

## PHASE 6: STABLE TREE ANALYSIS

**Step 6.1: Vulnerable code in stable**
Record: Confirmed present in v5.15.203, v6.1.169, v6.6.135, v6.12.83,
v7.0.1 - every active stable tree that contains ksmbd.

**Step 6.2: Backport complications**
Record: In 5.15 the file is `fs/ksmbd/smb2pdu.c`; in 6.1+ it's
`fs/smb/server/smb2pdu.c`. The surrounding code (the `if (!lock_count)`
block) is identical in all versions - patch applies cleanly with at most
a path adjustment for 5.15.

**Step 6.3: Related stable fixes**
Record: Prior smb2_lock fixes already went to stable (e.g.
309b44ed68449, 84d2d1641b71d). None address the O(N²) issue.

## PHASE 7: SUBSYSTEM CONTEXT

**Step 7.1: Subsystem**
Record: fs/smb/server/ (ksmbd) - in-kernel SMB3 server, network-exposed
on TCP/445. IMPORTANT criticality (anyone running ksmbd server is
exposed).

**Step 7.2: Activity**
Record: Active subsystem with regular security fixes; this fix is part
of a broader security hardening cycle (per 2026-04-23 pull request).

## PHASE 8: IMPACT AND RISK

**Step 8.1: Affected users**
Record: All systems running ksmbd (config-dependent - requires
CONFIG_SMB_SERVER=y and active share). Any SMB client with valid
credentials + any opened file can trigger.

**Step 8.2: Trigger**
Record: Single authenticated SMB2 LOCK request with LockCount=65535.
Easily crafted; attacker needs SMB credentials (guest accounts would
qualify on permissive shares).

**Step 8.3: Failure severity**
Record: CPU exhaustion / worker thread hang / service DoS - **HIGH
severity** (service unavailability from network). Not data
corruption/UAF, but a reliable, cheap DoS against network-exposed
service.

**Step 8.4: Benefit vs risk**
Record: Benefit = HIGH (closes a cheap DoS vector in network service).
Risk = VERY LOW (1 functional line, spec-backed cap, legitimate clients
don't exceed this). Excellent benefit/risk ratio.

## PHASE 9: SYNTHESIS

**Step 9.1: Evidence**
- FOR: Network-reachable DoS; trivial surgical fix; Acked by maintainer;
  applies to all stable trees; vulnerability present since v5.15;
  explicit maintainer description as "denial of service" fix; spec-
  justified cap.
- AGAINST: Requires authentication (but many deployments allow guest);
  no CVE assigned yet.

**Step 9.2: Stable rules**
1. Obviously correct & tested: YES (Acked-by maintainer, spec-justified
   cap)
2. Fixes a real bug: YES (authenticated DoS of network service)
3. Important issue: YES (security/availability)
4. Small & contained: YES (1 functional line + comment)
5. No new features: YES
6. Applies cleanly: YES (identical context in all stable trees)

**Step 9.3: Exception categories**
N/A - this is a straightforward bug/security fix.

**Step 9.4: Decision**
Strong YES. A one-line cap that kills a trivially-triggerable O(N²)
network DoS in an in-kernel SMB server, acked by the maintainer, applies
cleanly to every stable tree that has ksmbd.

## Verification

- [Phase 1] Parsed tags: Acked-by Namjae Jeon (ksmbd maintainer,
  verified via MAINTAINERS file for fs/smb/server/), Signed-off-by Steve
  French (CIFS/samba maintainer).
- [Phase 2] Diff analysis confirmed via Read: only functional change is
  adding `|| lock_count > 64` to an existing `if` at line 7494 in
  current tree; rest is a 5-line comment.
- [Phase 3] git log `fs/smb/server/smb2pdu.c`, git show
  v5.15/v6.1/v6.6/v6.12/v7.0 for the smb2_lock function - confirmed
  identical `if (!lock_count)` pattern in every stable tree.
- [Phase 3] Verified the nested O(N²) `list_for_each_entry(cmp_lock,
  &lock_list, llist)` inside `for (i = 0; i < lock_count; i++)` is
  present in v5.15 through v7.0.
- [Phase 4] WebFetch https://yhbt.net/lore/linux-
  cifs/?q=ksmbd+unbounded+LockCount - found the patch submission and
  Namjae Jeon's "Applied it to #ksmbd-for-next-next" reply.
- [Phase 4] WebFetch Steve French's [GIT PULL] ksmbd server fixes on
  2026-04-23 containing the commit, describing it as "cap maximum lock
  count to avoid potential denial of service".
- [Phase 4] b4 dig -c <hash> not usable because the commit is not in the
  local repo (it is a candidate from a future/incoming pull request).
- [Phase 5] Grep for `smb2_lock` - confirmed dispatched via
  `smb2ops.c:191` as SMB2_LOCK_HE command handler.
- [Phase 5] Read fs/smb/server/smb2misc.c lines 168-197 confirmed
  LockCount is sanity-checked against buffer size (16MB) but not against
  u16 range, so 65535 locks pass validation.
- [Phase 6] git log stable branches confirmed the vulnerable pattern
  exists in 5.15.203, 6.1.169, 6.6.135, 6.12.83, 7.0.1.
- [Phase 8] struct smb2_lock_element size (8+8+4+4=24 bytes) verified
  via fs/smb/common/smb2pdu.h - max buffer-bounded LockCount exceeds
  65535, so u16 max is reachable.
- UNVERIFIED: No CVE has been assigned (not verifiable from available
  data); not needed for decision.
- UNVERIFIED: Exact perf impact in seconds per 65535-lock request
  (commit message claims ~2.1 billion iterations; verified arithmetic
  65535*65536/2 ≈ 2.15×10⁹ matches).

This is a classic stable-candidate fix: small, obvious, maintainer-
acked, closes a cheap network-triggerable DoS against ksmbd that has
been exploitable since v5.15.

**YES**

 fs/smb/server/smb2pdu.c | 7 ++++++-
 1 file changed, 6 insertions(+), 1 deletion(-)

diff --git a/fs/smb/server/smb2pdu.c b/fs/smb/server/smb2pdu.c
index ad5559d48975b..660dfefeba8e7 100644
--- a/fs/smb/server/smb2pdu.c
+++ b/fs/smb/server/smb2pdu.c
@@ -7473,7 +7473,12 @@ int smb2_lock(struct ksmbd_work *work)
 	lock_ele = req->locks;
 
 	ksmbd_debug(SMB, "lock count is %d\n", lock_count);
-	if (!lock_count) {
+	/*
+	 * Cap lock_count at 64. The MS-SMB2 spec defines Open.LockSequenceArray
+	 * as exactly 64 entries so 64 is the intended ceiling. No real workload
+	 * comes close to this in a single request.
+	 */
+	if (!lock_count || lock_count > 64) {
 		err = -EINVAL;
 		goto out2;
 	}
-- 
2.53.0


  parent reply	other threads:[~2026-04-28 10:42 UTC|newest]

Thread overview: 76+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-04-28 10:40 [PATCH AUTOSEL 7.0] ALSA: hda/realtek: add quirk for HONOR MRB-XXX M1020 Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] tools/power/x86/intel-speed-select: Avoid current base freq as maximum Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.18] um: fix address-of CMSG_DATA() rvalue in stub Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.12] tty: serial: samsung_tty: avoid dev_dbg deadlock Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.18] drm/amdgpu: fix CPER ring header parsing Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.18] io_uring/rsrc: unify nospec indexing for direct descriptors Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.18] um: avoid struct sigcontext redefinition with musl Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.15] leds: lgm-sso: Fix typo in macro for src offset Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.15] fs/ntfs3: increase CLIENT_REC name field size Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.15] ksmbd: fix CreateOptions sanitization clobbering the whole field Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.1] thunderbolt: Disable CLx on Titan Ridge-based devices with old firmware Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.6] NFS: Use nlmclnt_shutdown_rpc_clnt() to safely shut down NLM Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.12] smb: client: compress: fix buffer overrun in lz77_compress() Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.18] drm/amd/display: Pass min page size from SOC BB to dml2_1 plane config Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.12] usb: dwc3: Support USB3340x ULPI PHY high-speed negotiation Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.12] smb: client: compress: fix counting in LZ77 match finding Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.18] mfd: mt6397: Properly fix CID of MT6328, MT6331 and MT6332 Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.1] um: Disable GCOV_PROFILE_ALL on 32-bit UML with Clang 20/21 Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.12] ASoC: qcom: x1e80100: limit speaker volumes Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.12] smb: client: compress: fix bad encoding on last LZ77 flag Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.15] fs/ntfs3: fix potential double iput on d_make_root() failure Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] scsi: storvsc: Handle PERSISTENT_RESERVE_IN truncation for Hyper-V vFC Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0] fs: aio: set VMA_DONTCOPY_BIT in mmap to fix NULL-pointer-dereference error Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] dt-bindings: arm64: add Marvell 7k COMe boards Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] ecryptfs: Set s_time_gran to get correct time granularity Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] usb: usbip: fix OOB read/write in usbip_pad_iso() Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.18] scsi: lpfc: Remove unnecessary ndlp kref get in lpfc_check_nlp_post_devloss Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.18] leds: core: Implement fallback to software node name for LED names Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.15] ntfs3: reject inodes with zero non-DOS link count Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] f2fs: fix to skip empty sections in f2fs_get_victim Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0] NFS: fix writeback in presence of errors Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.6] dt-bindings: rtc: microcrystal,rv3028: Allow to specify vdd-supply Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] fs: aio: reject partial mremap to avoid Null-pointer-dereference error Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.15] fs/ntfs3: fix $LXDEV xattr lookup Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.18] scsi: ufs: ufs-pci: Add support for Intel Nova Lake Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.1] scsi: lpfc: Fix incorrect txcmplq_cnt during cleanup in lpfc_sli_abort_ring() Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.18] drm/amdgpu: drop userq fence driver refs out of fence process() Sasha Levin
2026-04-28 10:40 ` Sasha Levin [this message]
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] usb: gadget: bdc: validate status-report endpoint indices Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.12] coda_flag_children(): fix a UAF Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] fbdev: savage: fix probe-path EDID cleanup leaks Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0] scsi: virtio_scsi: Move INIT_WORK calls to virtscsi_probe() Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] iio: ABI: fix current_trigger description Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] staging: octeon: fix free_irq dev_id mismatch in cvm_oct_rx_shutdown Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.12] mfd: intel-lpss: Add Intel Nova Lake-H PCI IDs Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] tty: serial: imx: keep dma request disabled before dma transfer setup Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-6.12] greybus: beagleplay: bound bootloader RX buffer copy Sasha Levin
2026-04-28 10:40 ` [PATCH AUTOSEL 7.0-5.10] serial: qcom-geni: Fix RTS behavior with flow control Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-5.10] selftests: fib_nexthops: test stale has_v4 on nexthop replace Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.1] ntfs3: fix OOB write in attr_wof_frame_info() Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-5.10] arm64: cputype: Add C1-Pro definitions Sasha Levin
2026-04-28 11:13   ` Mark Rutland
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.18] drm/amd/display: Fix HostVMMinPageSize unit mismatch in DML2.1 Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.12] 9p/trans_xen: make cleanup idempotent after dataring alloc errors Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0] drm/amdgpu: OR init_pte_flags into invalid leaf PTE updates Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.6] scsi: ufs: core: Disable timestamp for Kioxia THGJFJT0E25BAIP Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.18] f2fs: fix to freeze GC and discard threads quickly Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-5.10] scsi: esas2r: Fix __printf annotation on esas2r_log_master() Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.18] rtc: max77686: convert to i2c_new_ancillary_device Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.1] rtc: ti-k3: Add support to resume from IO DDR low power mode Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.12] bus: mhi: host: pci_generic: Add Telit FE912C04 modem support Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-5.10] usb: usbip: fix integer overflow in usbip_recv_iso() Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-5.10] clk: qcom: rcg2: expand frac table for mdss_pixel_clk_src Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-5.10] usb: usbip: validate iso frame actual_length in usbip_recv_iso() Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.12] bus: mhi: host: pci_generic: Add Qualcomm SDX35 modem Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0] drm/amd/display: Use overlay cursor when color pipeline is active Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.18] platform/x86: hp-wmi: Add support for Omen 16-wf1xxx (8C77) Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.12] smb: server: stop sending fake security descriptors Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.18] ALSA: usb-audio: Add quirk entries for NexiGo N930W webcam Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-5.15] ntfs3: fix memory leak in indx_create_allocate() Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-5.10] staging: fbtft: fix unchecked write return value in fb_agm1264k-fl Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-5.10] ipv6: Cap TLV scan in ip6_tnl_parse_tlv_enc_lim Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.18] scsi: lpfc: Add PCI ID support for LPe42100 series adapters Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.12] io_uring: take page references for NOMMU pbuf_ring mmaps Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-6.18] iio: imu: st_lsm6dsx: Add ACPI ID for SHIFT13mi gyroscope Sasha Levin
2026-04-28 10:41 ` [PATCH AUTOSEL 7.0-5.15] dt-bindings: clock: qcom,gcc-sc8180x: Add missing GDSCs Sasha Levin

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20260428104133.2858589-38-sashal@kernel.org \
    --to=sashal@kernel.org \
    --cc=akif.sait111@gmail.com \
    --cc=linkinjeon@kernel.org \
    --cc=linux-cifs@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=patches@lists.linux.dev \
    --cc=sfrench@samba.org \
    --cc=stable@vger.kernel.org \
    --cc=stfrench@microsoft.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox